Best Security Tips Ever

Security, Safety and Protection are things that we will always struggle with, no matter who you are, regardless of the kind of house you live in, or where you live – security will always be a concern.

Security Threats can find you anywhere, at any time and everyone is vulnerable. We blindly look to technology, believing its efficient and all we need to protect us, but as much as that is true, the equivalent [if not more] works in favour of the same threats we need protection from.
Crime evolves with technology. It equips criminals with better, more efficient tools and creative ways to carry out their crimes. No surprise there!

We no longer have the luxury of concerning ourselves with just home and body safety – there is a big dark cyber world out there, and their attacks are more severe and lasting than any home burglary. And with today’s social media obsession, who’s really to blame? We put ourselves out there, documenting every detail of our lives for anyone and everyone to see, risking personal information/details that you think is safe, but easily accessible to those who know where and what to look for!

Fact: South Africans spend an average of 8 hours online per day, a third of which is on social media.

Point: Protecting yourself online is important, more than you might think.

One of the many threats out there is Identity Theft.

It is real and serious and it’s an ever growing and terrifying danger that you have to protect yourself from.

It is easy to laugh off and think, this will never happen to me, but just one wrong click on the internet, or 1 fake telesales call where you are distracted and divulge some personal info you should not have and WHAM – that comfortable ‘I would never be so stupid’ rug is swept from under your feet and before you even comprehend what just happened, it’s gone… its all gone – your life, your money, your credit, your Identity!

Ever lose your wallet, or had it stolen? I have.
It’s a massive pain and so inconvenient and time-consuming, having to run around and cancel cards, get new cards, replace your ID or Drivers license [which means hours at home affairs] and of course, let’s not forget – buying a new wallet!.

Now, think what its like when your whole life is stolen, your identity – which is all you have that is actually yours, something that no one is supposed to ever be able to take from you – but they do, they have, and they will continue to do so – and anyone can be next.

Losing a wallet or having it stolen is unpleasant, disruptive and inconvenient.
Having your personal info/identity stolen/hacked is, without measure, WAY worse

So today I am sharing 5 Basic security tips [thats not as basic as it sounds because so many don’t think of it] to protect you from Identity theft:

1. Keep your Tax Info, Bank Statements, and financial docs in a secure place.

2. NEVER EVER give anyone your ID number or any other personal information unless you initiated the contact or you are sure that you know who you are dealing with

3. Your cellphone is not safe! NEVER EVER save sensitive information such as ID Numbers, Bank Login Details or PINS etc on your mobile.
Fingerprint and password-protected phones are never full proof – there’s always a way around it to unlock the phone.
If your phone is stolen with sensitive information stored on it, you have literally handed your identity to criminals all wrapped up with a pretty bow on top – to do with as they see [pro]fit!

4. Tighten up on your social networking security settings. It is known that Criminals can make use of the information obtained on social media platforms,
And do not ever respond to emails that provide you with a website link which requires you to either log in with a password, or update personal information

5. Protect your computer/phone/laptop from hackers by keeping your software up to date, install security apps and keep them up to date to help keep your devices more resilient against automated hacking tools.
Create complex Passwords on everything, and change them regularly. And do not save said passwords anywhere on any of your devices either!

It can never be emphasized enough: Always Protect your Personal and Financial Information.

 

Sources:
Businesstech
SARS
Kaspersky
CreativeBloq
Locklatch
TomsGuide


If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more Articles, please visit our Leads 2 Business Blog.

Please follow and like us:

About Jackie Van Zyl

My epic journey at Leads 2 Business started September 2008, as a Researcher / Data Capturer in the Tenders Africa Department. I joined Customer Relations in 2011, where I have had the great pleasure of being part of the Dynamic L2B Admin Department [From 2011 to present]. I deal with the Registration and Administration details of New Account Activations, and Existing Account Upgrades, etc. I also assist with client & staff queries. I’m a ‘think-out-of-the-box’ individual and an excellent problem solver. I am hardworking, meticulous, efficient, friendly and always happy to help! I look forward in assisting you with any queries you might have

Best Security Systems for an Office Building

posted in: Uncategorized 0

Best Security Systems for an Office Building

When choosing the right type of security system for your business you need to, make an informed decision and, know as much as possible about the various security systems available. Here is a list of the most important types of commercial security systems in the market:

FIRE ALARM SYSTEMS

Fire alarms won’t detect intruders but they do prevent you from losing assets that could be costly to replace if a fire were to occur. You would also be protecting the lives of your employees if a fire were to break out during business hours. SANS 10400: Part T – Fire Protection states that in the event of a fire:

The occupants or people using the building will be protected – including persons with disabilities;
The spread and intensity of any fire within buildings, and the spread of fire to any other buildings will be minimized;
The generation and spread of smoke will be minimized or controlled to the greatest extent reasonably practicable; and
Adequate means of access, and equipment for detecting, fighting, controlling and extinguishing such fire, is provided.

ACCESS CONTROL SYSTEMS

Controlling who has access to specific areas of the building is a way you can keep track of any indiscretions. Access control systems have the ability to collect data that states the time a person has accessed the building. Also, anyone who isn’t granted access will not have a way of entering the premises. This may be achieved by using a biometric access control unit where validation based on biometric qualities like iris and facial recognition, and fingerprint scans.

WIRELESS ALARM SYSTEMS

The advantage of a wireless alarm system is that it can go undetected as there are no visible wires. Intruders won’t be able to cut wires to disable the alarm system, and they will never know that they are being watched. Wireless systems are more likely to include solar and battery to stay on without the need for electricity in case of a power failure. Wireless sensors are easy to install, move and expand.

VIDEO SURVEILLANCE SYSTEMS

Video surveillance systems protect the inside and outside of your business. This can be very helpful because you can capture video of the intruder before they step foot into your business. If the intruder manages to come in and take something, presenting this type of video footage will be very helpful to the police when creating a report. Your video surveillance system should offer:

Easy access from anywhere
Safe storage – cloud storage/offsite
Flexibility to grow as your company expands

MONITORED SECURITY ALARM SYSTEMS

We’re living in the digital age, so everything, including your security alarm system, can be accessible to you through your cell phone. 24/7 monitoring stations call the phone number you provide to the alarm company when the alarm goes off and you’ll get an alert through the app too. A panic button will send an instant signal to the monitoring station whereby emergency help will be dispatched. Worth noting is that most insurance companies offer substantial savings to clients who have monitored systems, which may negate the cost of annual monitoring. Your security company should offer the following:

Investigations
Technical Assistance
Premises Monitoring
Armed Response and Escorting
Guarding and Security Consulting

IP-BASED SECURITY CAMERAS

Internet protocol cameras, or IP cameras, enable you to send and receive video footage through the internet and computer network. Improved ability for remote viewing and control, anyone on the network can potentially see video from any camera connected to the network. It is recommended that you use a camera with night vision capabilities. These cameras use an infrared spectrum of light at night and can view and record objects in the dark. Other advantages of this type of surveillance system are:

They record at a higher resolution. This means zooming in won’t create a blurry image.
They include motion detection and record any tampering with the camera.
You can use Power over Ethernet (PoE) to provide power to the cameras.
IP cameras are able to cover a better field of view.

All business sectors are affected in a range of ways by different types of crime. While it’s near impossible to eradicate theft entirely a comprehensive security solution is an effective way to minimise the impact.


If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more Events, please visit our Leads 2 Business Blog.

 

Please follow and like us:

About Mark Meyer

I joined Leads 2 Business in February 2009 and serve as IT Director.

Industry Events: Smart Procurement World Indaba 2018

Industry Events: Smart Procurement World Indaba 2018 

Construction Events

Event:

Smart Procurement World Indaba 2018

Date:

17 – 20 September 2018

Event location:

Gallagher Convention Centr, Midrand, Johannesburg

Event Description:

The 12th Annual Smart Procurement World conference and exhibition is the ultimate procurement and inbound supply chain conference in South Africa. Meet the buyers from South Africa’s top corporates and government. This is a sourcing exhibition is where you meet sourcing, procurement, purchasing and buying professionals from both government and the private sector. The exhibition will offer you easy access to procurement professionals ensuring that you can learn more about their requirements and meet their needs.

Contact Details:

http://www.smartprocurementworld.com/contact.html

Event Details:

Website
Pre-registration


If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more Events, please visit our Leads 2 Business Blog.

Please follow and like us:

About Sasha Anderson

Millennial Mom + wife living the hash-tag life

Industry Events: Interbuild Africa 2018 & International Information Security South Africa Conference

Industry Event: Interbuild Africa 2018 & International Information Security South Africa Conference

Construction Events

Event:

Interbuild Africa 2018

Date:

15 – 18 August 2018

Event location:

Expo Centre Nasrec, Johannesburg

Event Description:

The definitive showcase for the full spectrum of building, construction and related industries. These shows offer exhibitors unparalleled access to an international audience of key industry buyers and influential decision-makers. Take advantage of the opportunity to launch your latest products and innovations to a captive and specifically targeted industry audience. Come and meet the Leads 2 Business Team at Hall: 6 / Stand: D27.

Contact Details:

Tel: +27 (0)10 003 3063
E-mail: https://www.interbuild.co.za/contact.php

Event Details:

Website
Pre-registration

 

Event:

17th International Information Security South Africa Conference

Date:

15 – 16 August 2018

Event location:

University of Pretoria, Hatfield campus

Event Description:

ISSA2018 is the annual conference for the information security community that continues on the successful recipe established in 2001.

Contact Details:

E-mail: loockm@unisa.ac.za

Event Details:

Website
Pre-registration


If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more Events, please visit our Leads 2 Business Blog.

Please follow and like us:

About Sasha Anderson

Millennial Mom + wife living the hash-tag life

Common Security Myths

Common Security Myths

Myth (noun) – An unproved or false collective belief that is used to justify a social institution

Use strong passwords and don’t go to sketchy websites, and you’ll protect yourself online, right? Well… That’s a good start. But it’s not quite that simple.
The internet is evolving and so too is cybercrime.

Myth vs Reality:

Myth 1: Firewall + antivirus = total protection
Reality: Antivirus software and a firewall make it difficult for an intruder to get their hands on your information, but you also need to take protective measures. Free only offers basic antivirus and doesn’t have antispam, web filtering and behaviour analysis. Keep your software up to date and patched against vulnerabilities. Combining these technologies with good security habits is the best way to reduce your risk. Remember to lock or log off your computer when leaving your desk, even for a moment.

MYTH 2: Private browsing” is always private
Reality: Surfing the web in private (or incognito) mode prevents the browser — like Chrome, Firefox, and Internet Explorer — from collecting data about your activities. But it doesn’t hide your browsing from your internet service provider and the websites you visit. It also doesn’t hide your IP addresses from web servers and online snoops. Private hides your history from other users on the same computer but it will be tied to your computer.

 

 

 

 

MYTH 3: Infected computers display nasty messages and are very slow.
Reality: The most dangerous hacker is not the one who wants to put a joke or a skull on your screen; it’s the one who stealthily works to take control of your computer and cause damage to your equipment or steal information they can use for their benefit. This type of hacker works to ensure that their activities are not noticed by you.

MYTH 4: I don’t go to dangerous sites, and I check my links, so I’m safe.
Reality: Your browser is the biggest vulnerability. Most recent attacks take advantage of weaknesses in browser-related technologies to compromise your system. By simply visiting a compromised website may be sufficient to allow an attacker to gain control of your system. As if this weren’t bad enough, many legitimate sites are compromised and become sources of infection. Avoid accessing the web from protected systems behind your firewall.

Myth 5: Cyber security? Just leave it to the IT department

Reality: Cyber security is a business risk, not just an IT problem. Setting up the proper technology tools to provide cybersecurity protection are necessary. Organizations, management and staff need to adopt and extend these policies to establish a unified security posture. Staff need to be trained, educated and aware of security risks. Implementing appropriate technical controls to safeguard the information that an organisation holds is the first line of defence against security threats.

Myth 6: My Wi-Fi is unhackable if I hide it
Reality: Most routers give you the option of making your network ‘invisible’. This leaves people believing that since no-one can see their network, no-one on the outside can hack their connection. If someone wants to hack your Wi-Fi, it is quite likely that they have the technical competence to know that most networks are hidden and the know-how to make them visible even though you have hidden the network name. Keep older routers up to date, use strong passwords and check your routers manual to learn how to enable WPA2 wireless encryption on your router.

 

Conclusion

The bottom line is IT security must be a priority for your business, no matter the size of your operation. Based on your industry and security needs, you can work with professionals to customize the appropriate level of coverage for your company. It’s important to remember to apply patches and upgrades and upgrade in a timely manner, but that will only carry you so far. The weakest link in security is still the human element.

Sources:

 

If you are interested in becoming one of our subscribers, please visit our website.
To view notes with screenshots on how to use our website, please visit our Wiki site.
To view more articles, please visit our blog.

Please follow and like us:

About Chantélle Naudé

I have been with Leads 2 Business for 9 years, working in the Leads 2 Quotes department. Mother to two beautiful daughters.

Featured Tender: Supply and installation of security equipment X-ray Machines and Walk through Metal Detectors

.Supply and installation of security equipment X-ray Machines and Walk through Metal Detectors

Contract Number:

SENT/043/2017-18 – Sentech Soc Ltd

Description:

Supply and installation of security equipment X-ray Machines and Walk through Metal Detectors

 

Description:

Category Industries
 Security & Fire  Institutional
Region Site Inspection
 Gauteng  A compulsory session will be held on: Date: 05 April 2018 at Time: 11:00. Venue: Sentech SOC ltd, Octave Street, Radiokop Ext.3, Honeydew. Bidders must attend compulsory briefing session to be able to participate in this tender.
Closing Date Restrictions
 19 April 2018 at 12:00  The prequalification criteria applicable for this tender is BBBEE level of 1 to 4. Proposal must be physically delivered. Faxed or Emailed proposals will not be accepted. No Late submission will be accepted.

 

 

 

If you are a valued Tender subscriber, you can find more details about this Tender here
If you are interested in becoming one of our subscribers, please visit our website.
To view notes with screenshots on how to use our website, please visit our Wiki site.
To view more articles, please visit our blog.

 

Please follow and like us:

About Claire Donaldson

I started working at Leads 2 Business in February 2005, and have served as Head of Department of Daily Tenders from 2007 until the present. I oversee both the Daily Tenders South Africa and Africa Departments.

Featured Tender: Appointment of a Service Provider to Render Physical Alarm and Armed Response Security Services for the Independent Police Investigative Directorate in all Nine Provinces

Appointment of a Service Provider to Render Physical Alarm and Armed Response Security Services for the Independent Police Investigative Directorate in all Nine Provinces

Featured Tender

Description:

Bids are hereby invited for the following: Appointment of a Service Provider to Render Physical Alarm and Armed Response Security Services for the Independent Police Investigative Directorate in all Nine Provinces for a Period of Three (03) Years. Required at: National: Independent Police Investigative Directorate: Auxiliary Services.

Contract Number:

IPID02-17/8 – Independent Police Investigative Directorate

Category
Industries
 Security & Fire  Institutional
Region
Site Inspection
 South Africa  Meeting/Briefing Session:Briefing Session held on 23 March 2018 at 10:00. Venue: 7th Floor, 114 Madiba Street, City Forum Building, Pretoria.
Closing Date
Restrictions
 03 April 2018 at 11:00 Documents should be perfectly binded and Write the Bid Number on the Envelope. Late submissions will not be accepted.

 

If you are a valued Tender subscriber, you can find more details about this Tender here
If you are interested in becoming one of our subscribers, please visit our website.
To view notes with screenshots on how to use our website, please visit our Wiki site.
To view more articles, please visit our blog.

 

Please follow and like us:

About Claire Donaldson

I started working at Leads 2 Business in February 2005, and have served as Head of Department of Daily Tenders from 2007 until the present. I oversee both the Daily Tenders South Africa and Africa Departments.

General Safety in South Africa

Leads 2 Business : Safety

Crime in South Africa, like many other places in today’s world, can be a problem. Despite some negative perceptions about crime in South Africa, it’s generally safe & friendly, all you need to do is take sensible precautions & follow some general rules in order to stay safe.

 

Personal Safety Tips

  • Be aware of your surroundings
  • Avoid unfamiliar areas & walking alone
  • Avoid wearing/displaying valuables & large amounts of money
  • Take ATM Safety precautions
  • If you travel inform someone of your destination
  • Ensure that you know relevant emergency numbers
  • In a robbery situation, remain calm & do not resist
  • Take a self defense course
  • Don’t leave animals in the car
  • Trust your instincts at all times

 

Home Safety

  • Fencing & Gates
  • Alarm, CCTV & Intercom Systems
  • Dogs
  • Security Lighting
  • Ensure gates are locked at all times & keys/access devices are in a designated area

 

Vehicle Safety

  • Keep doors locked & windows closed
  • Do not leave valuables locked in the car
  • Park in well-lit places
  • If something seems suspicious, rather drive away
  • Vary the routes that you take & do not give strangers a lift
  • Ensure you have sufficient petrol
  • If you are in a road accident, drive to the nearest police station
  • Have your keys ready before approaching your vehicle
  • If you feel you are being followed, rather drive to the nearest police station

 

Safety Tips Unique to SA:

  • Look out for potholes
  • Beware of animals on the road & other native creepies and crawlies
  • Swimming in rivers can be dangerous due to hippos, crocodiles & bull sharks
  • Take Malaria precautions (repellents, nets)
  • Take Tick precautions (to prevent tick-bite fever)
  • Avoid drinking water from Rivers (Bilharzia & Cholera)
  • Sun protection (even on a cloudy day)
  • Beware of Remote Jamming
  • Beware of Taxi’s while driving/ walking
  • Keep updated on Load-shedding Schedules & take pro-active measures

 

Although it seems like you’ve just been handed a mountain of Safety Tips they are not there to prevent you from enjoying life. Keep them in mind & make them part of your daily routine & they will become effective habits before you know it.

Think of it like Dr George Cui, “Safety First, Then Healthy, then Happy, then Wealthy.”

 

P.S. Please add your Safety Tips in the comments section below.

 

Further Reading:

https://www.travelground.com/blog/10-ridiculous-commonly-asked-questions-south-africa/

 

 

 

 

Please follow and like us:

About Sasha Anderson

Millennial Mom + wife living the hash-tag life